ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Two Lessons Businesses Can Learn from the Spotify Data Discovery

Two Lessons Businesses Can Learn from the Spotify Data Discovery

Every so often, we come across a bit of news that helps to teach not one, but two cybersecurity best practices at the same time. With the recent news of a cache of hacked Spotify accounts, we find just such an opportunity. Let’s review the two lessons to be learned.

Lesson One: Don’t Reuse Your Passwords

Here’s the deal—hackers were able to access 350,000 accounts on Spotify’s systems without having to attack the streaming service at all. Instead, these hackers used login credentials that other data breaches had exposed on other sites and services.

Basically, the hackers took the credentials that had been taken from other breached websites and tried them out on Spotify to see what worked. This practice, known as credential stuffing, is a common and simple one for attackers to use.

Of course, while having any password breached isn’t a good thing, it can really become a problem if a user has reused that combination of credentials on multiple platforms. That’s why it is considered an essential best practice to always have a unique password for each account—especially any work-related or financial accounts—you use, saved in an encrypted password management tool if necessary.

Lesson Two: Make Sure Your Data is Secured

In a roundabout way, the people responsible for this breach can teach us another important lesson in data security—namely, the importance of properly securing the data that is collected.

This security issue was discovered when two researchers were scanning the Internet for unsecured data. The hackers had shortsightedly saved their stolen credentials on an unsecured cloud database, where anyone could presumably access them… no password required. As a result, other cybercriminals could have easily found the data as well and copied it for their own purposes.

While we’re happy that this data was found, it does shine a light on how important it is to keep your data secured and private. After all, Spotify has since prompted a password reset for affected users and rendered this data obsolete… at least, obsolete on the streaming platform. If the hackers had stored this data a little more securely, this data would still be that much more accurate.

You should learn from their example and take steps now to ensure that your data is good and properly secured.

ClearView IT can help you put both important lessons into practice. Reach out to us today to learn more about your data security and what you can do to help protect your assets without sacrificing productivity. Give us a call at 866-326-7214 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Upgrade Microsoft Office Smartphones Network Mobile Devices Communication Data Recovery Managed IT Services Quick Tips Productivity VoIP Users Social Media Mobile Device Tech Term Automation Facebook Windows 10 Business Continuity Covid-19 Disaster Recovery Passwords Holiday Browser Apps Windows 10 IT Support Managed Service Cloud Computing Miscellaneous Outsourced IT Managed Service Provider Remote Work Data Management Internet of Things Saving Money Operating System Government Gadgets Artificial Intelligence Workplace Strategy Managed IT services Networking Windows App Virtualization Business Technology Remote Spam Mobile Device Management Blockchain Server Bandwidth Information Encryption WiFi Office Budget Two-factor Authentication Employee/Employer Relationship Office 365 Apple History Information Technology Gmail Wi-Fi Access Control Conferencing Health Data Security Cybercrime Analytics BDR Big Data Help Desk Hacking IT Management Training Hacker Cost Management Employer-Employee Relationship Voice over Internet Protocol Patch Management Compliance Document Management Remote Computing Save Money Vendor Remote Monitoring Vulnerabilities BYOD Computing Vendor Management Hard Drive Search... Money Best Practice Data loss Customer Service Unified Threat Management Retail Firewall Mobile Office Legal Alert Augmented Reality Managed Services Word Hiring/Firing Data storage IBM Outlook Password Project Management Website Applications Black Market The Internet of Things Websites YouTube Monitoring Cleaning Mobility Meetings Healthcare Robot Mobile Computing Google Maps Laptop Scam Marketing Running Cable VPN Twitter Storage Update Social Sports SaaS DDoS Remote Workers Law Enforcement End of Support Printer Windows 7 Free Resource iPhone Education Cortana Paperless Office Antivirus User Content Filtering Data Breach Maintenance How To Travel Virtual Reality Router Windows 11 Social Engineering Chrome Cryptocurrency Downloads Computer Care Vulnerability Multi-factor Authentication Employees PowerPoint Software as a Service Avoiding Downtime Politics Administration Settings Data Protection Machine Learning Holidays Wireless Technology Presentation Saving Time eWaste Specifications Solid State Drive IT Consultant Bitcoin Cooperation Computers Video Conferencing Downtime Safety Customer Relationship Management Telephone Chromebook Virtual Machines Drones Co-Managed IT Computer Repair Entertainment Automobile Virtual Desktop Tech Terms Excel Experience Professional Services Managed IT How To Digital Microchip Flexibility Managed Services Provider Taxes Virtual Assistant Disaster Virtual Private Network Hack Identity Theft HIPAA Notifications Current Events Unified Communications Lithium-ion battery Physical Security Processor Google Docs Solutions Bluetooth Distributed Denial of Service Processors Images 101 Office Tips Integration Memory Display Start Menu Private Cloud News Botnet AI Trend Micro User Tip Vendor Mangement Legislation Supply Chain Network Management Samsung Digital Security Cameras Rental Service Electronic Health Records Inbound Marketing Evernote Micrsooft Transportation Flash Wasting Time Uninterrupted Power Supply Webcam Fake News Telephone Systems eCommerce Proxy Server Business Growth Business Mangement Modem Emails Public Speaking Workplace Service Level Agreement Tablets Computing Infrastructure Videos Surveillance Streaming Media Electronic Payment Managing Costs Management Device security Supercomputer Microsoft Excel Banking Google Calendar Google Wallet SSID Keyboard Wireless Headphones Virus Employer/Employee Relationships Hard Drives Scams Going Green Business Cards Media Messenger Development Tech Deep Learning Virtual Machine Phone System Error intranet Motion Sickness Reviews Business Metrics Comparison Optimization Wireless Bookmark Hosted Solution Google Drive Shortcut Term Teamwork Heating/Cooling Cables Download Environment Piracy 2FA Books Data Storage Windows XP Language Knowledge Hypervisor Society Corporate Profile Social Networking HTML Nanotechnology Employer Employee Relationship Shopping Television Browsers Telephony Medical IT Google Play Monitors SQL Server Point of Sale Computer Accessories Upload Visible Light Communication Cabling Software License Paperless Reading PCI DSS Licensing Social Network Windows 8 Tablet G Suite Screen Reader Tracking Gig Economy Mouse Humor Data Analysis VoIP Shortcuts Security Cameras Displays Azure Trends Advertising Mobile Technology Business Communications Relocation Internet Service Provider Regulations Compliance Work/Life Balance Managed IT Service Customer Resource management Tech Support Devices Web Server Digital Payment Tip of the week SharePoint Memes Staffing Fileless Malware Be Proactive IP Address Gamification Worker Company Culture Human Resources Net Neutrality In Internet of Things Financial Data Telephone System Access Regulations Backup and Disaster Recovery Public Cloud Risk Management Hacks IT Troubleshooting Directions Network Congestion Time Management Workplace Strategies Writing Content Desktop Google Apps Reliable Computing Telework Audit Electronic Medical Records Spyware Accountants Database File Sharing Smartwatch Communitications Recovery Microsoft 365 Competition Redundancy Scalability Procurement Administrator FinTech LiFi Text Messaging Health IT Proactive IT Cache Entrepreneur Equifax Tactics Workers Hard Drive Disposal CES Bring Your Own Device IT Assessment Documents Business Owner Unified Threat Management Application Smart Technology Value Username Business Intelligence Supply Chain Management Freedom of Information Organization Printing Cyber security Music Startup CCTV Addiction email scam Smart Devices Securty Navigation Touchscreen Emergency Domains Mobile Security Computer Malfunction Remote Working

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?